Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

The Mirai botnet is malware designed to take control of the BusyBox systems that are commonly used in IoT devices. BusyBox software is a lightweight executable capable of running several Unix tools in a variety of POSIX environments that have limited resources, making it an ideal candidate for IoT devices. It appears the DDoS attacks of October 21 have been identified… Read more

Tags: iot, botnets, mirai

We’ve got the week’s news covered for you.In This Week's EpisodeNation State Threat AttributionMercedes autonomous carsStephen Hawking on AIBanks failing to report hacksIndian Bank debit card breachOther Stories of InterestFemale speakers for your tech eventHow hackers handle stolen login dataDFIR and Threat HuntingThe real… Read more


For many years the defense and intelligence communities have relied upon a concept called gamification to test concepts, strategies, and potential outcomes in various scenarios via computer simulation. They have found that gamification heightens interest of the players involved and serves as a stimulus for creativity and interchange of ideas which is vital for keeping an edge. As computers have… Read more

Tags: infosec, gamification

verb (used with object), optimized, optimizing.1. to make as effective, perfect, or useful as possible. 2. to make the best of.Breaches continue, attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.While ‘fixing’ security in totality is a topic… Read more


The art of detecting vulnerabilities within the enterprise environment has been around for some time. Vulnerability scanning and management technologies and methodologies have evolved (sometimes rather quietly) to meet customer demands, which are fuelled by compliance and regulatory requirements.In simple terms, vulnerability scanning is to look for vulnerabilities within an environment.As an example, let’s use a… Read more

Tags: vulnerability scanning, vulnerability management

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content